{"id":"CVE-2022-49700","summary":"mm/slub: add missing TID updates on slab deactivation","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slub: add missing TID updates on slab deactivation\n\nThe fastpath in slab_alloc_node() assumes that c-\u003eslab is stable as long as\nthe TID stays the same. However, two places in __slab_alloc() currently\ndon't update the TID when deactivating the CPU slab.\n\nIf multiple operations race the right way, this could lead to an object\ngetting lost; or, in an even more unlikely situation, it could even lead to\nan object being freed onto the wrong slab's freelist, messing up the\n`inuse` counter and eventually causing a page to be freed to the page\nallocator while it still contains slab objects.\n\n(I haven't actually tested these cases though, this is just based on\nlooking at the code. Writing testcases for this stuff seems like it'd be\na pain...)\n\nThe race leading to state inconsistency is (all operations on the same CPU\nand kmem_cache):\n\n - task A: begin do_slab_free():\n    - read TID\n    - read pcpu freelist (==NULL)\n    - check `slab == c-\u003eslab` (true)\n - [PREEMPT A-\u003eB]\n - task B: begin slab_alloc_node():\n    - fastpath fails (`c-\u003efreelist` is NULL)\n    - enter __slab_alloc()\n    - slub_get_cpu_ptr() (disables preemption)\n    - enter ___slab_alloc()\n    - take local_lock_irqsave()\n    - read c-\u003efreelist as NULL\n    - get_freelist() returns NULL\n    - write `c-\u003eslab = NULL`\n    - drop local_unlock_irqrestore()\n    - goto new_slab\n    - slub_percpu_partial() is NULL\n    - get_partial() returns NULL\n    - slub_put_cpu_ptr() (enables preemption)\n - [PREEMPT B-\u003eA]\n - task A: finish do_slab_free():\n    - this_cpu_cmpxchg_double() succeeds()\n    - [CORRUPT STATE: c-\u003eslab==NULL, c-\u003efreelist!=NULL]\n\nFrom there, the object on c-\u003efreelist will get lost if task B is allowed to\ncontinue from here: It will proceed to the retry_load_slab label,\nset c-\u003eslab, then jump to load_freelist, which clobbers c-\u003efreelist.\n\nBut if we instead continue as follows, we get worse corruption:\n\n - task A: run __slab_free() on object from other struct slab:\n    - CPU_PARTIAL_FREE case (slab was on no list, is now on pcpu partial)\n - task A: run slab_alloc_node() with NUMA node constraint:\n    - fastpath fails (c-\u003eslab is NULL)\n    - call __slab_alloc()\n    - slub_get_cpu_ptr() (disables preemption)\n    - enter ___slab_alloc()\n    - c-\u003eslab is NULL: goto new_slab\n    - slub_percpu_partial() is non-NULL\n    - set c-\u003eslab to slub_percpu_partial(c)\n    - [CORRUPT STATE: c-\u003eslab points to slab-1, c-\u003efreelist has objects\n      from slab-2]\n    - goto redo\n    - node_match() fails\n    - goto deactivate_slab\n    - existing c-\u003efreelist is passed into deactivate_slab()\n    - inuse count of slab-1 is decremented to account for object from\n      slab-2\n\nAt this point, the inuse count of slab-1 is 1 lower than it should be.\nThis means that if we free all allocated objects in slab-1 except for one,\nSLUB will think that slab-1 is completely unused, and may free its page,\nleading to use-after-free.","modified":"2026-03-10T21:53:44.900220Z","published":"2025-02-26T02:24:20.878Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49700.json"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0515cc9b6b24877f59b222ade704bfaa42caa2a6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/197e257da473c725dfe47759c3ee02f2398d8ea5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6c32496964da0dc230cea763a0e934b2e02dabd5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d6a597450e686d4c6388bd3cdcb17224b4dae7f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e7e3e90d671078455a3a08189f89d85b3da2de9e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eeaa345e128515135ccb864c04482180c08e3259"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49700.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49700"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"03e404af26dc2ea0d278d7a342de0aab394793ce"},{"fixed":"308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082"},{"fixed":"d6a597450e686d4c6388bd3cdcb17224b4dae7f0"},{"fixed":"e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7"},{"fixed":"e7e3e90d671078455a3a08189f89d85b3da2de9e"},{"fixed":"6c32496964da0dc230cea763a0e934b2e02dabd5"},{"fixed":"0515cc9b6b24877f59b222ade704bfaa42caa2a6"},{"fixed":"197e257da473c725dfe47759c3ee02f2398d8ea5"},{"fixed":"eeaa345e128515135ccb864c04482180c08e3259"}]}],"versions":["v3.0","v3.0-rc6","v3.0-rc7","v3.1","v3.1-rc1","v3.1-rc10","v3.1-rc2","v3.1-rc3","v3.1-rc4","v3.1-rc5","v3.1-rc6","v3.1-rc7","v3.1-rc8","v3.1-rc9","v3.10","v3.10-rc1","v3.10-rc2","v3.10-rc3","v3.10-rc4","v3.10-rc5","v3.10-rc6","v3.10-rc7","v3.11","v3.11-rc1","v3.11-rc2","v3.11-rc3","v3.11-rc4","v3.11-rc5","v3.11-rc6","v3.11-rc7","v3.12","v3.12-rc1","v3.12-rc2","v3.12-rc3","v3.12-rc4","v3.12-rc5","v3.12-rc6","v3.12-rc7","v3.13","v3.13-rc1","v3.13-rc2","v3.13-rc3","v3.13-rc4","v3.13-rc5","v3.13-rc6","v3.13-rc7","v3.13-rc8","v3.14","v3.14-rc1","v3.14-rc2","v3.14-rc3","v3.14-rc4","v3.14-rc5","v3.14-rc6","v3.14-rc7","v3.14-rc8","v3.15","v3.15-rc1","v3.15-rc2","v3.15-rc3","v3.15-rc4","v3.15-rc5","v3.15-rc6","v3.15-rc7","v3.15-rc8","v3.16","v3.16-rc1","v3.16-rc2","v3.16-rc3","v3.16-rc4","v3.16-rc5","v3.16-rc6","v3.16-rc7","v3.17","v3.17-rc1","v3.17-rc2","v3.17-rc3","v3.17-rc4","v3.17-rc5","v3.17-rc6","v3.17-rc7","v3.18","v3.18-rc1","v3.18-rc2","v3.18-rc3","v3.18-rc4","v3.18-rc5","v3.18-rc6","v3.18-rc7","v3.19","v3.19-rc1","v3.19-rc2","v3.19-rc3","v3.19-rc4","v3.19-rc5","v3.19-rc6","v3.19-rc7","v3.2","v3.2-rc1","v3.2-rc2","v3.2-rc3","v3.2-rc4","v3.2-rc5","v3.2-rc6","v3.2-rc7","v3.3","v3.3-rc1","v3.3-rc2","v3.3-rc3","v3.3-rc4","v3.3-rc5","v3.3-rc6","v3.3-rc7","v3.4","v3.4-rc1","v3.4-rc2","v3.4-rc3","v3.4-rc4","v3.4-rc5","v3.4-rc6","v3.4-rc7","v3.5","v3.5-rc1","v3.5-rc2","v3.5-rc3","v3.5-rc4","v3.5-rc5","v3.5-rc6","v3.5-rc7","v3.6","v3.6-rc1","v3.6-rc2","v3.6-rc3","v3.6-rc4","v3.6-rc5","v3.6-rc6","v3.6-rc7","v3.7","v3.7-rc1","v3.7-rc2","v3.7-rc3","v3.7-rc4","v3.7-rc5","v3.7-rc6","v3.7-rc7","v3.7-rc8","v3.8","v3.8-rc1","v3.8-rc2","v3.8-rc3","v3.8-rc4","v3.8-rc5","v3.8-rc6","v3.8-rc7","v3.9","v3.9-rc1","v3.9-rc2","v3.9-rc3","v3.9-rc4","v3.9-rc5","v3.9-rc6","v3.9-rc7","v3.9-rc8","v4.0","v4.0-rc1","v4.0-rc2","v4.0-rc3","v4.0-rc4","v4.0-rc5","v4.0-rc6","v4.0-rc7","v4.1","v4.1-rc1","v4.1-rc2","v4.1-rc3","v4.1-rc4","v4.1-rc5","v4.1-rc6","v4.1-rc7","v4.1-rc8","v4.10","v4.10-rc1","v4.10-rc2","v4.10-rc3","v4.10-rc4","v4.10-rc5","v4.10-rc6","v4.10-rc7","v4.10-rc8","v4.11","v4.11-rc1","v4.11-rc2","v4.11-rc3","v4.11-rc4","v4.11-rc5","v4.11-rc6","v4.11-rc7","v4.11-rc8","v4.12","v4.12-rc1","v4.12-rc2","v4.12-rc3","v4.12-rc4","v4.12-rc5","v4.12-rc6","v4.12-rc7","v4.13","v4.13-rc1","v4.13-rc2","v4.13-rc3","v4.13-rc4","v4.13-rc5","v4.13-rc6","v4.13-rc7","v4.14","v4.14-rc1","v4.14-rc2","v4.14-rc3","v4.14-rc4","v4.14-rc5","v4.14-rc6","v4.14-rc7","v4.14-rc8","v4.14.1","v4.14.10","v4.14.100","v4.14.101","v4.14.102","v4.14.103","v4.14.104","v4.14.105","v4.14.106","v4.14.107","v4.14.108","v4.14.109","v4.14.11","v4.14.110","v4.14.111","v4.14.112","v4.14.113","v4.14.114","v4.14.115","v4.14.116","v4.14.117","v4.14.118","v4.14.119","v4.14.12","v4.14.120","v4.14.121","v4.14.122","v4.14.123","v4.14.124","v4.14.125","v4.14.126","v4.14.127","v4.14.128","v4.14.129","v4.14.13","v4.14.130","v4.14.131","v4.14.132","v4.14.133","v4.14.134","v4.14.135","v4.14.136","v4.14.137","v4.14.138","v4.14.139","v4.14.14","v4.14.140","v4.14.141","v4.14.142","v4.14.143","v4.14.144","v4.14.145","v4.14.146","v4.14.147","v4.14.148","v4.14.149","v4.14.15","v4.14.150","v4.14.151","v4.14.152","v4.14.153","v4.14.154","v4.14.155","v4.14.156","v4.14.157","v4.14.158","v4.14.159","v4.14.16","v4.14.160","v4.14.161","v4.14.162","v4.14.163","v4.14.164","v4.14.165","v4.14.166","v4.14.167","v4.14.168","v4.14.169","v4.14.17","v4.14.170","v4.14.171","v4.14.172","v4.14.173","v4.14.174","v4.14.175","v4.14.176","v4.14.177","v4.14.178","v4.14.179","v4.14.18","v4.14.180","v4.14.181","v4.14.182","v4.14.183","v4.14.184","v4.14.185","v4.14.186","v4.14.187","v4.14.188","v4.14.189","v4.14.19","v4.14.190","v4.14.191","v4.14.192","v4.14.193","v4.14.194","v4.14.195","v4.14.196","v4.14.197","v4.14.198","v4.14.199","v4.14.2","v4.14.20","v4.14.200","v4.14.201","v4.14.202","v4.14.203","v4.14.204","v4.14.205","v4.14.206","v4.14.207","v4.14.208","v4.14.209","v4.14.21","v4.14.210","v4.14.211","v4.14.212","v4.14.213","v4.14.214","v4.14.215","v4.14.216","v4.14.217","v4.14.218","v4.14.219","v4.14.22","v4.14.220","v4.14.221","v4.14.222","v4.14.223","v4.14.224","v4.14.225","v4.14.226","v4.14.227","v4.14.228","v4.14.229","v4.14.23","v4.14.230","v4.14.231","v4.14.232","v4.14.233","v4.14.234","v4.14.235","v4.14.236","v4.14.237","v4.14.238","v4.14.239","v4.14.24","v4.14.240","v4.14.241","v4.14.242","v4.14.243","v4.14.244","v4.14.245","v4.14.246","v4.14.247","v4.14.248","v4.14.249","v4.14.25","v4.14.250","v4.14.251","v4.14.252","v4.14.253","v4.14.254","v4.14.255","v4.14.256","v4.14.257","v4.14.258","v4.14.259","v4.14.26","v4.14.260","v4.14.261","v4.14.262","v4.14.263","v4.14.264","v4.14.265","v4.14.266","v4.14.267","v4.14.268","v4.14.269","v4.14.27","v4.14.270","v4.14.271","v4.14.272","v4.14.273","v4.14.274","v4.14.275","v4.14.276","v4.14.277","v4.14.278","v4.14.279","v4.14.28","v4.14.280","v4.14.281","v4.14.282","v4.14.283","v4.14.284","v4.14.285","v4.14.286","v4.14.287","v4.14.29","v4.14.3","v4.14.30","v4.14.31","v4.14.32","v4.14.33","v4.14.34","v4.14.35","v4.14.36","v4.14.37","v4.14.38","v4.14.39","v4.14.4","v4.14.40","v4.14.41","v4.14.42","v4.14.43","v4.14.44","v4.14.45","v4.14.46","v4.14.47","v4.14.48","v4.14.49","v4.14.5","v4.14.50","v4.14.51","v4.14.52","v4.14.53","v4.14.54","v4.14.55","v4.14.56","v4.14.57","v4.14.58","v4.14.59","v4.14.6","v4.14.60","v4.14.61","v4.14.62","v4.14.63","v4.14.64","v4.14.65","v4.14.66","v4.14.67","v4.14.68","v4.14.69","v4.14.7","v4.14.70","v4.14.71","v4.14.72","v4.14.73","v4.14.74","v4.14.75","v4.14.76","v4.14.77","v4.14.78","v4.14.79","v4.14.8","v4.14.80","v4.14.81","v4.14.82","v4.14.83","v4.14.84","v4.14.85","v4.14.86","v4.14.87","v4.14.88","v4.14.89","v4.14.9","v4.14.90","v4.14.91","v4.14.92","v4.14.93","v4.14.94","v4.14.95","v4.14.96","v4.14.97","v4.14.98","v4.14.99","v4.15","v4.15-rc1","v4.15-rc2","v4.15-rc3","v4.15-rc4","v4.15-rc5","v4.15-rc6","v4.15-rc7","v4.15-rc8","v4.15-rc9","v4.16","v4.16-rc1","v4.16-rc2","v4.16-rc3","v4.16-rc4","v4.16-rc5","v4.16-rc6","v4.16-rc7","v4.17","v4.17-rc1","v4.17-rc2","v4.17-rc3","v4.17-rc4","v4.17-rc5","v4.17-rc6","v4.17-rc7","v4.18","v4.18-rc1","v4.18-rc2","v4.18-rc3","v4.18-rc4","v4.18-rc5","v4.18-rc6","v4.18-rc7","v4.18-rc8","v4.19","v4.19-rc1","v4.19-rc2","v4.19-rc3","v4.19-rc4","v4.19-rc5","v4.19-rc6","v4.19-rc7","v4.19-rc8","v4.19.1","v4.19.10","v4.19.100","v4.19.101","v4.19.102","v4.19.103","v4.19.104","v4.19.105","v4.19.106","v4.19.107","v4.19.108","v4.19.109","v4.19.11","v4.19.110","v4.19.111","v4.19.112","v4.19.113","v4.19.114","v4.19.115","v4.19.116","v4.19.117","v4.19.118","v4.19.119","v4.19.12","v4.19.120","v4.19.121","v4.19.122","v4.19.123","v4.19.124","v4.19.125","v4.19.126","v4.19.127","v4.19.128","v4.19.129","v4.19.13","v4.19.130","v4.19.131","v4.19.132","v4.19.133","v4.19.134","v4.19.135","v4.19.136","v4.19.137","v4.19.138","v4.19.139","v4.19.14","v4.19.140","v4.19.141","v4.19.142","v4.19.143","v4.19.144","v4.19.145","v4.19.146","v4.19.147","v4.19.148","v4.19.149","v4.19.15","v4.19.150","v4.19.151","v4.19.152","v4.19.153","v4.19.154","v4.19.155","v4.19.156","v4.19.157","v4.19.158","v4.19.159","v4.19.16","v4.19.160","v4.19.161","v4.19.162","v4.19.163","v4.19.164","v4.19.165","v4.19.166","v4.19.167","v4.19.168","v4.19.169","v4.19.17","v4.19.170","v4.19.171","v4.19.172","v4.19.173","v4.19.174","v4.19.175","v4.19.176","v4.19.177","v4.19.178","v4.19.179","v4.19.18","v4.19.180","v4.19.181","v4.19.182","v4.19.183","v4.19.184","v4.19.185","v4.19.186","v4.19.187","v4.19.188","v4.19.189","v4.19.19","v4.19.190","v4.19.191","v4.19.192","v4.19.193","v4.19.194","v4.19.195","v4.19.196","v4.19.197","v4.19.198","v4.19.199","v4.19.2","v4.19.20","v4.19.200","v4.19.201","v4.19.202","v4.19.203","v4.19.204","v4.19.205","v4.19.206","v4.19.207","v4.19.208","v4.19.209","v4.19.21","v4.19.210","v4.19.211","v4.19.212","v4.19.213","v4.19.214","v4.19.215","v4.19.216","v4.19.217","v4.19.218","v4.19.219","v4.19.22","v4.19.220","v4.19.221","v4.19.222","v4.19.223","v4.19.224","v4.19.225","v4.19.226","v4.19.227","v4.19.228","v4.19.229","v4.19.23","v4.19.230","v4.19.231","v4.19.232","v4.19.233","v4.19.234","v4.19.235","v4.19.236","v4.19.237","v4.19.238","v4.19.239","v4.19.24","v4.19.240","v4.19.241","v4.19.242","v4.19.243","v4.19.244","v4.19.245","v4.19.246","v4.19.247","v4.19.248","v4.19.249","v4.19.25","v4.19.250","v4.19.251","v4.19.26","v4.19.27","v4.19.28","v4.19.29","v4.19.3","v4.19.30","v4.19.31","v4.19.32","v4.19.33","v4.19.34","v4.19.35","v4.19.36","v4.19.37","v4.19.38","v4.19.39","v4.19.4","v4.19.40","v4.19.41","v4.19.42","v4.19.43","v4.19.44","v4.19.45","v4.19.46","v4.19.47","v4.19.48","v4.19.49","v4.19.5","v4.19.50","v4.19.51","v4.19.52","v4.19.53","v4.19.54","v4.19.55","v4.19.56","v4.19.57","v4.19.58","v4.19.59","v4.19.6","v4.19.60","v4.19.61","v4.19.62","v4.19.63","v4.19.64","v4.19.65","v4.19.66","v4.19.67","v4.19.68","v4.19.69","v4.19.7","v4.19.70","v4.19.71","v4.19.72","v4.19.73","v4.19.74","v4.19.75","v4.19.76","v4.19.77","v4.19.78","v4.19.79","v4.19.8","v4.19.80","v4.19.81","v4.19.82","v4.19.83","v4.19.84","v4.19.85","v4.19.86","v4.19.87","v4.19.88","v4.19.89","v4.19.9","v4.19.90","v4.19.91","v4.19.92","v4.19.93","v4.19.94","v4.19.95","v4.19.96","v4.19.97","v4.19.98","v4.19.99","v4.2","v4.2-rc1","v4.2-rc2","v4.2-rc3","v4.2-rc4","v4.2-rc5","v4.2-rc6","v4.2-rc7","v4.2-rc8","v4.20","v4.20-rc1","v4.20-rc2","v4.20-rc3","v4.20-rc4","v4.20-rc5","v4.20-rc6","v4.20-rc7","v4.3","v4.3-rc1","v4.3-rc2","v4.3-rc3","v4.3-rc4","v4.3-rc5","v4.3-rc6","v4.3-rc7","v4.4","v4.4-rc1","v4.4-rc2","v4.4-rc3","v4.4-rc4","v4.4-rc5","v4.4-rc6","v4.4-rc7","v4.4-rc8","v4.5","v4.5-rc1","v4.5-rc2","v4.5-rc3","v4.5-rc4","v4.5-rc5","v4.5-rc6","v4.5-rc7","v4.6","v4.6-rc1","v4.6-rc2","v4.6-rc3","v4.6-rc4","v4.6-rc5","v4.6-rc6","v4.6-rc7","v4.7","v4.7-rc1","v4.7-rc2","v4.7-rc3","v4.7-rc4","v4.7-rc5","v4.7-rc6","v4.7-rc7","v4.8","v4.8-rc1","v4.8-rc2","v4.8-rc3","v4.8-rc4","v4.8-rc5","v4.8-rc6","v4.8-rc7","v4.8-rc8","v4.9","v4.9-rc1","v4.9-rc2","v4.9-rc3","v4.9-rc4","v4.9-rc5","v4.9-rc6","v4.9-rc7","v4.9-rc8","v4.9.1","v4.9.10","v4.9.100","v4.9.101","v4.9.102","v4.9.103","v4.9.104","v4.9.105","v4.9.106","v4.9.107","v4.9.108","v4.9.109","v4.9.11","v4.9.110","v4.9.111","v4.9.112","v4.9.113","v4.9.114","v4.9.115","v4.9.116","v4.9.117","v4.9.118","v4.9.119","v4.9.12","v4.9.120","v4.9.121","v4.9.122","v4.9.123","v4.9.124","v4.9.125","v4.9.126","v4.9.127","v4.9.128","v4.9.129","v4.9.13","v4.9.130","v4.9.131","v4.9.132","v4.9.133","v4.9.134","v4.9.135","v4.9.136","v4.9.137","v4.9.138","v4.9.139","v4.9.14","v4.9.140","v4.9.141","v4.9.142","v4.9.143","v4.9.144","v4.9.145","v4.9.146","v4.9.147","v4.9.148","v4.9.149","v4.9.15","v4.9.150","v4.9.151","v4.9.152","v4.9.153","v4.9.154","v4.9.155","v4.9.156","v4.9.157","v4.9.158","v4.9.159","v4.9.16","v4.9.160","v4.9.161","v4.9.162","v4.9.163","v4.9.164","v4.9.165","v4.9.166","v4.9.167","v4.9.168","v4.9.169","v4.9.17","v4.9.170","v4.9.171","v4.9.172","v4.9.173","v4.9.174","v4.9.175","v4.9.176","v4.9.177","v4.9.178","v4.9.179","v4.9.18","v4.9.180","v4.9.181","v4.9.182","v4.9.183","v4.9.184","v4.9.185","v4.9.186","v4.9.187","v4.9.188","v4.9.189","v4.9.19","v4.9.190","v4.9.191","v4.9.192","v4.9.193","v4.9.194","v4.9.195","v4.9.196","v4.9.197","v4.9.198","v4.9.199","v4.9.2","v4.9.20","v4.9.200","v4.9.201","v4.9.202","v4.9.203","v4.9.204","v4.9.205","v4.9.206","v4.9.207","v4.9.208","v4.9.209","v4.9.21","v4.9.210","v4.9.211","v4.9.212","v4.9.213","v4.9.214","v4.9.215","v4.9.216","v4.9.217","v4.9.218","v4.9.219","v4.9.22","v4.9.220","v4.9.221","v4.9.222","v4.9.223","v4.9.224","v4.9.225","v4.9.226","v4.9.227","v4.9.228","v4.9.229","v4.9.23","v4.9.230","v4.9.231","v4.9.232","v4.9.233","v4.9.234","v4.9.235","v4.9.236","v4.9.237","v4.9.238","v4.9.239","v4.9.24","v4.9.240","v4.9.241","v4.9.242","v4.9.243","v4.9.244","v4.9.245","v4.9.246","v4.9.247","v4.9.248","v4.9.249","v4.9.25","v4.9.250","v4.9.251","v4.9.252","v4.9.253","v4.9.254","v4.9.255","v4.9.256","v4.9.257","v4.9.258","v4.9.259","v4.9.26","v4.9.260","v4.9.261","v4.9.262","v4.9.263","v4.9.264","v4.9.265","v4.9.266","v4.9.267","v4.9.268","v4.9.269","v4.9.27","v4.9.270","v4.9.271","v4.9.272","v4.9.273","v4.9.274","v4.9.275","v4.9.276","v4.9.277","v4.9.278","v4.9.279","v4.9.28","v4.9.280","v4.9.281","v4.9.282","v4.9.283","v4.9.284","v4.9.285","v4.9.286","v4.9.287","v4.9.288","v4.9.289","v4.9.29","v4.9.290","v4.9.291","v4.9.292","v4.9.293","v4.9.294","v4.9.295","v4.9.296","v4.9.297","v4.9.298","v4.9.299","v4.9.3","v4.9.30","v4.9.300","v4.9.301","v4.9.302","v4.9.303","v4.9.304","v4.9.305","v4.9.306","v4.9.307","v4.9.308","v4.9.309","v4.9.31","v4.9.310","v4.9.311","v4.9.312","v4.9.313","v4.9.314","v4.9.315","v4.9.316","v4.9.317","v4.9.318","v4.9.319","v4.9.32","v4.9.320","v4.9.321","v4.9.322","v4.9.33","v4.9.34","v4.9.35","v4.9.36","v4.9.37","v4.9.38","v4.9.39","v4.9.4","v4.9.40","v4.9.41","v4.9.42","v4.9.43","v4.9.44","v4.9.45","v4.9.46","v4.9.47","v4.9.48","v4.9.49","v4.9.5","v4.9.50","v4.9.51","v4.9.52","v4.9.53","v4.9.54","v4.9.55","v4.9.56","v4.9.57","v4.9.58","v4.9.59","v4.9.6","v4.9.60","v4.9.61","v4.9.62","v4.9.63","v4.9.64","v4.9.65","v4.9.66","v4.9.67","v4.9.68","v4.9.69","v4.9.7","v4.9.70","v4.9.71","v4.9.72","v4.9.73","v4.9.74","v4.9.75","v4.9.76","v4.9.77","v4.9.78","v4.9.79","v4.9.8","v4.9.80","v4.9.81","v4.9.82","v4.9.83","v4.9.84","v4.9.85","v4.9.86","v4.9.87","v4.9.88","v4.9.89","v4.9.9","v4.9.90","v4.9.91","v4.9.92","v4.9.93","v4.9.94","v4.9.95","v4.9.96","v4.9.97","v4.9.98","v4.9.99","v5.0","v5.0-rc1","v5.0-rc2","v5.0-rc3","v5.0-rc4","v5.0-rc5","v5.0-rc6","v5.0-rc7","v5.0-rc8","v5.1","v5.1-rc1","v5.1-rc2","v5.1-rc3","v5.1-rc4","v5.1-rc5","v5.1-rc6","v5.1-rc7","v5.10","v5.10-rc1","v5.10-rc2","v5.10-rc3","v5.10-rc4","v5.10-rc5","v5.10-rc6","v5.10-rc7","v5.10.1","v5.10.10","v5.10.100","v5.10.101","v5.10.102","v5.10.103","v5.10.104","v5.10.105","v5.10.106","v5.10.107","v5.10.108","v5.10.109","v5.10.11","v5.10.110","v5.10.111","v5.10.112","v5.10.113","v5.10.114","v5.10.115","v5.10.116","v5.10.117","v5.10.118","v5.10.119","v5.10.12","v5.10.120","v5.10.121","v5.10.122","v5.10.123","v5.10.124","v5.10.125","v5.10.126","v5.10.127","v5.10.128","v5.10.129","v5.10.13","v5.10.14","v5.10.15","v5.10.16","v5.10.17","v5.10.18","v5.10.19","v5.10.2","v5.10.20","v5.10.21","v5.10.22","v5.10.23","v5.10.24","v5.10.25","v5.10.26","v5.10.27","v5.10.28","v5.10.29","v5.10.3","v5.10.30","v5.10.31","v5.10.32","v5.10.33","v5.10.34","v5.10.35","v5.10.36","v5.10.37","v5.10.38","v5.10.39","v5.10.4","v5.10.40","v5.10.41","v5.10.42","v5.10.43","v5.10.44","v5.10.45","v5.10.46","v5.10.47","v5.10.48","v5.10.49","v5.10.5","v5.10.50","v5.10.51","v5.10.52","v5.10.53","v5.10.54","v5.10.55","v5.10.56","v5.10.57","v5.10.58","v5.10.59","v5.10.6","v5.10.60","v5.10.61","v5.10.62","v5.10.63","v5.10.64","v5.10.65","v5.10.66","v5.10.67","v5.10.68","v5.10.69","v5.10.7","v5.10.70","v5.10.71","v5.10.72","v5.10.73","v5.10.74","v5.10.75","v5.10.76","v5.10.77","v5.10.78","v5.10.79","v5.10.8","v5.10.80","v5.10.81","v5.10.82","v5.10.83","v5.10.84","v5.10.85","v5.10.86","v5.10.87","v5.10.88","v5.10.89","v5.10.9","v5.10.90","v5.10.91","v5.10.92","v5.10.93","v5.10.94","v5.10.95","v5.10.96","v5.10.97","v5.10.98","v5.10.99","v5.11","v5.11-rc1","v5.11-rc2","v5.11-rc3","v5.11-rc4","v5.11-rc5","v5.11-rc6","v5.11-rc7","v5.12","v5.12-rc1","v5.12-rc1-dontuse","v5.12-rc2","v5.12-rc3","v5.12-rc4","v5.12-rc5","v5.12-rc6","v5.12-rc7","v5.12-rc8","v5.13","v5.13-rc1","v5.13-rc2","v5.13-rc3","v5.13-rc4","v5.13-rc5","v5.13-rc6","v5.13-rc7","v5.14","v5.14-rc1","v5.14-rc2","v5.14-rc3","v5.14-rc4","v5.14-rc5","v5.14-rc6","v5.14-rc7","v5.15","v5.15-rc1","v5.15-rc2","v5.15-rc3","v5.15-rc4","v5.15-rc5","v5.15-rc6","v5.15-rc7","v5.15.1","v5.15.10","v5.15.11","v5.15.12","v5.15.13","v5.15.14","v5.15.15","v5.15.16","v5.15.17","v5.15.18","v5.15.19","v5.15.2","v5.15.20","v5.15.21","v5.15.22","v5.15.23","v5.15.24","v5.15.25","v5.15.26","v5.15.27","v5.15.28","v5.15.29","v5.15.3","v5.15.30","v5.15.31","v5.15.32","v5.15.33","v5.15.34","v5.15.35","v5.15.36","v5.15.37","v5.15.38","v5.15.39","v5.15.4","v5.15.40","v5.15.41","v5.15.42","v5.15.43","v5.15.44","v5.15.45","v5.15.46","v5.15.47","v5.15.48","v5.15.49","v5.15.5","v5.15.50","v5.15.51","v5.15.52","v5.15.53","v5.15.6","v5.15.7","v5.15.8","v5.15.9","v5.16","v5.16-rc1","v5.16-rc2","v5.16-rc3","v5.16-rc4","v5.16-rc5","v5.16-rc6","v5.16-rc7","v5.16-rc8","v5.17","v5.17-rc1","v5.17-rc2","v5.17-rc3","v5.17-rc4","v5.17-rc5","v5.17-rc6","v5.17-rc7","v5.17-rc8","v5.18","v5.18-rc1","v5.18-rc2","v5.18-rc3","v5.18-rc4","v5.18-rc5","v5.18-rc6","v5.18-rc7","v5.18.1","v5.18.2","v5.18.3","v5.18.4","v5.18.5","v5.18.6","v5.18.7","v5.19-rc1","v5.19-rc2","v5.2","v5.2-rc1","v5.2-rc2","v5.2-rc3","v5.2-rc4","v5.2-rc5","v5.2-rc6","v5.2-rc7","v5.3","v5.3-rc1","v5.3-rc2","v5.3-rc3","v5.3-rc4","v5.3-rc5","v5.3-rc6","v5.3-rc7","v5.3-rc8","v5.4","v5.4-rc1","v5.4-rc2","v5.4-rc3","v5.4-rc4","v5.4-rc5","v5.4-rc6","v5.4-rc7","v5.4-rc8","v5.4.1","v5.4.10","v5.4.100","v5.4.101","v5.4.102","v5.4.103","v5.4.104","v5.4.105","v5.4.106","v5.4.107","v5.4.108","v5.4.109","v5.4.11","v5.4.110","v5.4.111","v5.4.112","v5.4.113","v5.4.114","v5.4.115","v5.4.116","v5.4.117","v5.4.118","v5.4.119","v5.4.12","v5.4.120","v5.4.121","v5.4.122","v5.4.123","v5.4.124","v5.4.125","v5.4.126","v5.4.127","v5.4.128","v5.4.129","v5.4.13","v5.4.130","v5.4.131","v5.4.132","v5.4.133","v5.4.134","v5.4.135","v5.4.136","v5.4.137","v5.4.138","v5.4.139","v5.4.14","v5.4.140","v5.4.141","v5.4.142","v5.4.143","v5.4.144","v5.4.145","v5.4.146","v5.4.147","v5.4.148","v5.4.149","v5.4.15","v5.4.150","v5.4.151","v5.4.152","v5.4.153","v5.4.154","v5.4.155","v5.4.156","v5.4.157","v5.4.158","v5.4.159","v5.4.16","v5.4.160","v5.4.161","v5.4.162","v5.4.163","v5.4.164","v5.4.165","v5.4.166","v5.4.167","v5.4.168","v5.4.169","v5.4.17","v5.4.170","v5.4.171","v5.4.172","v5.4.173","v5.4.174","v5.4.175","v5.4.176","v5.4.177","v5.4.178","v5.4.179","v5.4.18","v5.4.180","v5.4.181","v5.4.182","v5.4.183","v5.4.184","v5.4.185","v5.4.186","v5.4.187","v5.4.188","v5.4.189","v5.4.19","v5.4.190","v5.4.191","v5.4.192","v5.4.193","v5.4.194","v5.4.195","v5.4.196","v5.4.197","v5.4.198","v5.4.199","v5.4.2","v5.4.20","v5.4.200","v5.4.201","v5.4.202","v5.4.203","v5.4.204","v5.4.21","v5.4.22","v5.4.23","v5.4.24","v5.4.25","v5.4.26","v5.4.27","v5.4.28","v5.4.29","v5.4.3","v5.4.30","v5.4.31","v5.4.32","v5.4.33","v5.4.34","v5.4.35","v5.4.36","v5.4.37","v5.4.38","v5.4.39","v5.4.4","v5.4.40","v5.4.41","v5.4.42","v5.4.43","v5.4.44","v5.4.45","v5.4.46","v5.4.47","v5.4.48","v5.4.49","v5.4.5","v5.4.50","v5.4.51","v5.4.52","v5.4.53","v5.4.54","v5.4.55","v5.4.56","v5.4.57","v5.4.58","v5.4.59","v5.4.6","v5.4.60","v5.4.61","v5.4.62","v5.4.63","v5.4.64","v5.4.65","v5.4.66","v5.4.67","v5.4.68","v5.4.69","v5.4.7","v5.4.70","v5.4.71","v5.4.72","v5.4.73","v5.4.74","v5.4.75","v5.4.76","v5.4.77","v5.4.78","v5.4.79","v5.4.8","v5.4.80","v5.4.81","v5.4.82","v5.4.83","v5.4.84","v5.4.85","v5.4.86","v5.4.87","v5.4.88","v5.4.89","v5.4.9","v5.4.90","v5.4.91","v5.4.92","v5.4.93","v5.4.94","v5.4.95","v5.4.96","v5.4.97","v5.4.98","v5.4.99","v5.5","v5.5-rc1","v5.5-rc2","v5.5-rc3","v5.5-rc4","v5.5-rc5","v5.5-rc6","v5.5-rc7","v5.6","v5.6-rc1","v5.6-rc2","v5.6-rc3","v5.6-rc4","v5.6-rc5","v5.6-rc6","v5.6-rc7","v5.7","v5.7-rc1","v5.7-rc2","v5.7-rc3","v5.7-rc4","v5.7-rc5","v5.7-rc6","v5.7-rc7","v5.8","v5.8-rc1","v5.8-rc2","v5.8-rc3","v5.8-rc4","v5.8-rc5","v5.8-rc6","v5.8-rc7","v5.9","v5.9-rc1","v5.9-rc2","v5.9-rc3","v5.9-rc4","v5.9-rc5","v5.9-rc6","v5.9-rc7","v5.9-rc8"],"database_specific":{"vanir_signatures":[{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e3e90d671078455a3a08189f89d85b3da2de9e","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"105069892452050388053074970319772374479","length":1620},"deprecated":false,"id":"CVE-2022-49700-139bcffd"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7","target":{"function":"deactivate_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"198807045846531031014138733260278693959","length":2105},"deprecated":false,"id":"CVE-2022-49700-17bc55ec"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e3e90d671078455a3a08189f89d85b3da2de9e","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["40147995757969018907260173510112362156","164985540673631977357762055708209769595","230873671306792419080977549432761860278","195101541097081870358695796604134405201","250339480263985758670124874371425733248","332162620870701129781257272974909188075","99663995409527347471845018296939098226","24995538239635222763876982052368521986","301893294442246839119074046206098401189","186586871957341391818562450209282715265","250019047539882222006473082908409187578","139719664182289237938188484157541668355"]},"deprecated":false,"id":"CVE-2022-49700-19c0f0f7"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"105069892452050388053074970319772374479","length":1620},"deprecated":false,"id":"CVE-2022-49700-1ccaa63d"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eeaa345e128515135ccb864c04482180c08e3259","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["55768429331329545390310239106981303919","155973361966303774333597059244284379271","162691841390943720082114154501420667356","287595365083714388080340380081861115934","208588648838062109002860995587869948313","231649796662562231778232543340034953540","42654384429249983658841075485649535333","279025291215393746793553916746469086838"]},"deprecated":false,"id":"CVE-2022-49700-246629f8"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0515cc9b6b24877f59b222ade704bfaa42caa2a6","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"139047500129606864457731649670528936914","length":3221},"deprecated":false,"id":"CVE-2022-49700-2edb59e1"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6a597450e686d4c6388bd3cdcb17224b4dae7f0","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["40147995757969018907260173510112362156","164985540673631977357762055708209769595","230873671306792419080977549432761860278","195101541097081870358695796604134405201","250339480263985758670124874371425733248","332162620870701129781257272974909188075","99663995409527347471845018296939098226","24995538239635222763876982052368521986","301893294442246839119074046206098401189","186586871957341391818562450209282715265","250019047539882222006473082908409187578","139719664182289237938188484157541668355"]},"deprecated":false,"id":"CVE-2022-49700-2f275200"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c32496964da0dc230cea763a0e934b2e02dabd5","target":{"function":"deactivate_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"238035710577846967376332797272894676965","length":2204},"deprecated":false,"id":"CVE-2022-49700-365173e3"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6a597450e686d4c6388bd3cdcb17224b4dae7f0","target":{"function":"flush_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"167733319880909405774381273145192993770","length":211},"deprecated":false,"id":"CVE-2022-49700-3771d3bf"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@197e257da473c725dfe47759c3ee02f2398d8ea5","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"183826250432902699148027095861524355636","length":3221},"deprecated":false,"id":"CVE-2022-49700-40412cc4"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6a597450e686d4c6388bd3cdcb17224b4dae7f0","target":{"function":"deactivate_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"198807045846531031014138733260278693959","length":2105},"deprecated":false,"id":"CVE-2022-49700-4a569546"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c32496964da0dc230cea763a0e934b2e02dabd5","target":{"function":"flush_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"167733319880909405774381273145192993770","length":211},"deprecated":false,"id":"CVE-2022-49700-51e95455"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"269823638377900948829995003452608240340","length":1752},"deprecated":false,"id":"CVE-2022-49700-6f055999"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c32496964da0dc230cea763a0e934b2e02dabd5","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["40147995757969018907260173510112362156","164985540673631977357762055708209769595","230873671306792419080977549432761860278","195101541097081870358695796604134405201","250339480263985758670124874371425733248","332162620870701129781257272974909188075","99663995409527347471845018296939098226","24995538239635222763876982052368521986","301893294442246839119074046206098401189","186586871957341391818562450209282715265","250019047539882222006473082908409187578","139719664182289237938188484157541668355"]},"deprecated":false,"id":"CVE-2022-49700-78212eec"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eeaa345e128515135ccb864c04482180c08e3259","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"87574819803440855272538000657279939650","length":3209},"deprecated":false,"id":"CVE-2022-49700-81cedb09"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6c32496964da0dc230cea763a0e934b2e02dabd5","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"244334869661463524876145467602248214075","length":1658},"deprecated":false,"id":"CVE-2022-49700-8ad7ddca"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7","target":{"function":"flush_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"167733319880909405774381273145192993770","length":211},"deprecated":false,"id":"CVE-2022-49700-8b4c251f"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0515cc9b6b24877f59b222ade704bfaa42caa2a6","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["301893294442246839119074046206098401189","7225491137326846074037047488772910898","27268481291560667265095925736461409038","310098679726064903706737474191949940214","83808393440056878563937957358827152770","159861786318197165844029250699719509281","95007791048898542642986686166743978694","214279786189504479716480942798449033729"]},"deprecated":false,"id":"CVE-2022-49700-8c33ab86"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@197e257da473c725dfe47759c3ee02f2398d8ea5","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["55768429331329545390310239106981303919","155973361966303774333597059244284379271","162691841390943720082114154501420667356","287595365083714388080340380081861115934","208588648838062109002860995587869948313","231649796662562231778232543340034953540","42654384429249983658841075485649535333","279025291215393746793553916746469086838"]},"deprecated":false,"id":"CVE-2022-49700-946653f4"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2b2f0e2e34d71ae6c2a1114fd3c525930e84bc7","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["40147995757969018907260173510112362156","164985540673631977357762055708209769595","230873671306792419080977549432761860278","195101541097081870358695796604134405201","250339480263985758670124874371425733248","332162620870701129781257272974909188075","99663995409527347471845018296939098226","24995538239635222763876982052368521986","301893294442246839119074046206098401189","186586871957341391818562450209282715265","250019047539882222006473082908409187578","139719664182289237938188484157541668355"]},"deprecated":false,"id":"CVE-2022-49700-ac0541ad"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d6a597450e686d4c6388bd3cdcb17224b4dae7f0","target":{"function":"___slab_alloc","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"105069892452050388053074970319772374479","length":1620},"deprecated":false,"id":"CVE-2022-49700-b61821b1"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@308c6d0e1f200fd26c71270c6e6bfcf0fc6ff082","target":{"file":"mm/slub.c"},"signature_version":"v1","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["47295590079436007138583795362239608057","26650738910397095182264822485685271560","325415380771464387316552511832172514036","318100368190481237463170992477330936853","53677195624123001515753963142223903252","26650738910397095182264822485685271560","325415380771464387316552511832172514036","308393225268619430901082892945259521122","301893294442246839119074046206098401189","186586871957341391818562450209282715265","250019047539882222006473082908409187578","139719664182289237938188484157541668355","129148424930287968491996278728438571723","139965315876387491956516913111046215903","75823661311162779061934178420436271358","145089692317841320137315765597393685141","49732208803703949686402614818582272224","73649176641476418903341066093273265317","269385059687728719841462249894026117784","242848538900561626700297441147236323186"]},"deprecated":false,"id":"CVE-2022-49700-c4664018"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e3e90d671078455a3a08189f89d85b3da2de9e","target":{"function":"deactivate_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"98078646641841612847495014285985059690","length":2152},"deprecated":false,"id":"CVE-2022-49700-e4dc62a8"},{"source":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e7e3e90d671078455a3a08189f89d85b3da2de9e","target":{"function":"flush_slab","file":"mm/slub.c"},"signature_version":"v1","signature_type":"Function","digest":{"function_hash":"167733319880909405774381273145192993770","length":211},"deprecated":false,"id":"CVE-2022-49700-ef639453"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49700.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}